咨询与建议

限定检索结果

文献类型

  • 4,624 篇 会议
  • 61 册 图书
  • 52 篇 期刊文献

馆藏范围

  • 4,737 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,467 篇 工学
    • 2,803 篇 计算机科学与技术...
    • 1,819 篇 软件工程
    • 1,228 篇 信息与通信工程
    • 603 篇 电气工程
    • 519 篇 控制科学与工程
    • 408 篇 电子科学与技术(可...
    • 313 篇 生物工程
    • 216 篇 生物医学工程(可授...
    • 211 篇 动力工程及工程热...
    • 204 篇 仪器科学与技术
    • 192 篇 机械工程
    • 137 篇 环境科学与工程(可...
    • 135 篇 安全科学与工程
    • 126 篇 光学工程
    • 110 篇 化学工程与技术
    • 101 篇 网络空间安全
    • 100 篇 石油与天然气工程
    • 98 篇 交通运输工程
  • 1,182 篇 理学
    • 566 篇 数学
    • 319 篇 生物学
    • 288 篇 物理学
    • 180 篇 统计学(可授理学、...
    • 144 篇 化学
    • 141 篇 系统科学
  • 719 篇 管理学
    • 485 篇 管理科学与工程(可...
    • 285 篇 图书情报与档案管...
    • 231 篇 工商管理
  • 205 篇 医学
    • 187 篇 临床医学
    • 180 篇 基础医学(可授医学...
    • 119 篇 药学(可授医学、理...
  • 104 篇 法学
  • 87 篇 经济学
  • 67 篇 农学
  • 52 篇 教育学
  • 25 篇 文学
  • 19 篇 军事学
  • 8 篇 艺术学

主题

  • 272 篇 cloud computing
  • 117 篇 internet of thin...
  • 113 篇 wireless communi...
  • 102 篇 real-time system...
  • 101 篇 mobile communica...
  • 101 篇 mobile computing
  • 89 篇 wireless sensor ...
  • 74 篇 security
  • 62 篇 protocols
  • 61 篇 computer archite...
  • 59 篇 computational mo...
  • 56 篇 machine learning
  • 56 篇 accuracy
  • 55 篇 deep learning
  • 55 篇 grid computing
  • 55 篇 monitoring
  • 53 篇 authentication
  • 53 篇 computer network...
  • 50 篇 quality of servi...
  • 48 篇 bandwidth

机构

  • 50 篇 school of inform...
  • 12 篇 department of el...
  • 11 篇 chitkara univers...
  • 10 篇 school of comput...
  • 10 篇 department of bi...
  • 10 篇 saveetha univers...
  • 9 篇 college of compu...
  • 9 篇 the islamic univ...
  • 9 篇 institute of com...
  • 9 篇 graphic era deem...
  • 8 篇 symbiosis instit...
  • 8 篇 school of inform...
  • 8 篇 department of el...
  • 8 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 koneru lakshmaia...
  • 7 篇 school of comput...
  • 7 篇 teerthanker maha...
  • 7 篇 university karna...
  • 6 篇 department of el...

作者

  • 10 篇 wang wei
  • 8 篇 gehlot anita
  • 8 篇 ramaraj kottaima...
  • 8 篇 jianxiong li
  • 7 篇 prabhu v.
  • 7 篇 ramesh t.
  • 7 篇 satapathy suresh...
  • 6 篇 nath vijay
  • 6 篇 murugan s.
  • 6 篇 chunxiao tang
  • 6 篇 s. murugan
  • 6 篇 kottaimalai rama...
  • 6 篇 kumar sanjeev
  • 6 篇 nugroho anto sat...
  • 6 篇 miao changyun
  • 6 篇 mannava vishnuva...
  • 6 篇 ma ming
  • 6 篇 gupta mridul
  • 5 篇 jui c.c.h.
  • 5 篇 oshima a.

语言

  • 4,597 篇 英文
  • 103 篇 其他
  • 41 篇 中文
  • 1 篇 法文
检索条件"任意字段=Proceedings of the 2nd International Conference on Autonomic Computing and Communication Systems"
4737 条 记 录,以下是21-30 订阅
排序:
Artificial Intelligence Enabled Cognitive computing for AlN/β-Ga2O3 HEMT  2
Artificial Intelligence Enabled Cognitive Computing for AlN/...
收藏 引用
2nd international conference on Computational Intelligence, communication Technology and Networking, CICTN 2025
作者: Verma, Yogesh Kumar Bhatia, Kamal Khushboo Bhanot, Aastha Roy, Trijeeta Sinha, Supriya Laksh School of Electronics and Electrical Engineering Lovely Professional University Jalandhar India School of Computer Science and Engineering Lovely Professional University Jalandhar India
HEMT devices have potential to handle the fast processing in applications such as real-time diagnostics utilizing the artificial-intelligence (AI) enhanced abilities. Along-with this HEMT devices can be extensively us... 详细信息
来源: 评论
Motion based Message and Voice Conveyor for Disabled People  2
Motion based Message and Voice Conveyor for Disabled People
收藏 引用
2nd international conference on Sustainable computing and Data communication systems, ICSCDS 2023
作者: Vanitha, U. Architha, B. Charrunethra, C.R. Elakiyaa, M. Electronics & Communication Engineering Sri Krishna College of Engineering & Technology Coimbatore India
There are a lot of physically handicapped and paralysed people in real life. This study intends to develop a novel model to assist the paralysed people. The primary objective of this study is to train the handicapped ... 详细信息
来源: 评论
proceedings of ICACS 2020 - 4th international conference on Algorithms, computing and systems - ICACS-AECCC 2020 - 2nd African Electronics, Computer and communication conference
Proceedings of ICACS 2020 - 4th International Conference on ...
收藏 引用
4th international conference on Algorithms, computing and systems, ICACS 2020, held jointly with the 2nd African Electronics, Computer and communication conference, ICACS-AECCC 2020
The proceedings contain 18 papers. The topics discussed include: a new distributed optimization algorithm for MINLPs with affinely coupled decision variables;ranking fuzzy numbers by similarity measure index;compresse...
来源: 评论
Contextualized Autonomous Drone Navigation Using LLMs Deployed in Edge-Cloud computing  2
Contextualized Autonomous Drone Navigation Using LLMs Deploy...
收藏 引用
2nd international conference on Machine Learning and Autonomous systems, ICMLAS 2025
作者: Chen, Hongqian Tang, Yun Tsourdos, Antonios Guo, Weisi School of Aerospace Transport Manufacturing Cranfield University Bedford United Kingdom
Autonomous navigation is usually trained offline in diverse scenarios and fine-tuned online subject to real-world experiences. However, the real world is dynamic and changeable, and many environmental encounters/effec... 详细信息
来源: 评论
Design of Triangular Slotted &DGS Based Textile Antenna for Wireless and Sub 5G Band applications  2
Design of Triangular Slotted &DGS Based Textile Antenna for ...
收藏 引用
2nd international conference on Advancements in Smart, Secure and Intelligent computing, ASSIC 2024
作者: Dwivedi, Raghav Srivastava, D.K. Singh, Vinod Kumar Biet Department of Electronics and Communication UP Jhansi India Srgi Department of Electronics and Communication UP Jhansi India
The use of textile antennas has become a viable option for wireless communication applications due to their flexibility, lightweight nature, and the ability to integrate seamlessly with clothing or other textile subst... 详细信息
来源: 评论
Low Power Hardware Accelerator for Hash Operations in Modern Processors  2
Low Power Hardware Accelerator for Hash Operations in Modern...
收藏 引用
2nd international conference on Networking, Embedded and Wireless systems, ICNEWS 2024
作者: Raghunath, Alekhya Rekha, S.S. Sudeendra Kumar, K. PES University Department of Electronics and Communication Bengaluru India
Hashing is vital because of its numerous applications in image processing, blockchain technology, cryptographic computing, networking applications, and other domains. One of the most common non-cryptographic applicati... 详细信息
来源: 评论
Spheroid Fractal Patch Antenna for Wireless Applications  2
Spheroid Fractal Patch Antenna for Wireless Applications
收藏 引用
2nd international conference on Recent Trends in Microelectronics, Automation, computing, and communications systems, ICMACC 2024
作者: Mathur, Vinita Tyagi, Parul Vyas, Ritu Sharma, Lokesh Mishra, J.P. Sharma, Vikas JECRC Department of Electronics and Communication Jaipur India
A novel spheroid fractal microstrip patch aerial with appearance as lollipop contour is proposed and manufactured. The recommended antenna produces frequency band from 2.27-5.83 GHz and 7.00- 10.70 GHz and has been de... 详细信息
来源: 评论
IoT Based Inverter for Autonomous Electric Vehicle Drive using CIPOS IPM  2
IoT Based Inverter for Autonomous Electric Vehicle Drive usi...
收藏 引用
2nd IEEE international conference on Intelligent and Innovative Technologies in computing, Electrical and Electronics, ICIITCEE 2024
作者: Chandan, A.S. Savanth, Ashwini S. Vijaya, P.A. Indian Institute of Science Department of Electronics Systems Engineering Bengaluru India BNM Institute of Technology Dept. of Electronics and Communication Engineering Bengaluru India
Intelligent power modules (IPM) play a crucial role in the evolution of motor control technology. These modules combine various power semiconductor devices, such as MOSFETs and IGTs, along with control circuitry in a ... 详细信息
来源: 评论
Analyzing the Impact of Quantum Cryptography on Network Security  2
Analyzing the Impact of Quantum Cryptography on Network Secu...
收藏 引用
2nd IEEE international conference on Integrated Circuits and communication systems, ICICACS 2024
作者: Vadakkethil Somanathan Pillai, Sanjaikanth E Polimetla, Kiran University of North Dakota School of Electrical Engineering and Computer Science Grand ForksND United States Adobe Inc Dept. of Information Technology AustinTX United States
Quantum cryptography is a field that employs principles of quantum physics to communicate via networks. It has developed as an ability to handle the growing risks to network security, including cyber-attacks and data ... 详细信息
来源: 评论
Embedded Automation Device Based on Trusted computing  2
Embedded Automation Device Based on Trusted Computing
收藏 引用
2nd IEEE international conference on Integrated Circuits and communication systems, ICICACS 2024
作者: Chen, Yuanyuan Wang, Huiping Bi, Andong Liu, You Zhuang, Chunyou Lv, Yanfeng Liu, Tongshan Baoding Cigarette Factory Hebei Baisha Tobacco Co. Ltd Baoding China
Trusted computing technology, as a new type of information security technology, has been applied in various fields. In order to ensure the safe and stable operation of industrial and power automation systems, it is pr... 详细信息
来源: 评论